1 |
Karan Timmala and Kavitha D |
CERVICAL SPINE FRACTURE DETECTION USING DEEP LEARNING |
2 |
Dr Sushil Shukla |
Totally Umbilical Lightlike Hypersurfaces of Kenmotsu Space Form |
3 |
Shivanshu Singh, Faizan Karim and G. Parimala |
Classification and Interpretation of various stages for Diabetic Retinopathy using Deep Neural Network |
4 |
P.Phani Krishna Raju, N.Sai Sreenivas and Dr. Viji Amutha Mary |
VISION BASED COMMUNICATION LANGUAGE FOR DIFFERENTLY ABLED PEOPLE USING MACHINE LEARNING ALGORITHM |
5 |
Saheli Thakur, Santonu Naskar, Kankona Chowdhury, Aritra Banerjee and Souvik Majumdar |
Survey of Advancements in State-of-the-art (SOTA) Deep Neural Approaches for Machine Reading Comprehension |
6 |
Niteesh Satya Sai Boddapu, Veera Venakata Sai Tirumalasetty, Nidita Pasapula, Krishna Reddy Thota Muddula and Ramesh Kumar Reddy Veeram Reddy |
A Deep Learning based Recognition of Human Activity |
7 |
Rachit Sachdeva, Sarthak Katyal, Krishan Kant Choudhary and Rohit Kaushik |
Sensory Perception of Haptic Rendering in Surgical Simulation |
8 |
Abinaya K, Ishwarya K and Saraswathi S |
Plant Leaf Classification Using a Compact Deep Learning Model Use of VGG-16 |
9 |
Susmitha A |
Thread Hunting 101: Hunting with YARA Rules |
10 |
Kuldeep Yadav and Neetu Gupta |
UTILIZING QR CODES, CRYPTOGRAPHY, AND WEB SERVICE FOR PRODUCT AUTHENTICATION. |
13 |
Pavan Kumar Boddapati, Nagarajan M.K and Venu Gopal Reddy Kamjula |
Smart Electricity Billing System |
14 |
Uppada Triveni, D Swapna, Vadithya Vandana and Medisetti Rachana |
Analysis of Electronic Cryptogram |
15 |
Riya Solanki and Payal Chaudhari |
Collusion – resistant Encryption scheme for VANET with Fine-grained Access Control System |
17 |
Shreyash Gondane, Saharsh Wasnik, Sanjay Jengthe, Shubham Paunikar, Rutuja Pohare and Ritu Pawar |
Contract/Tendering System using Block-chain |
19 |
Jayesh Patel and Kirit Modi |
Mathematics and Artificial Intelligence: Exploring Synergies for Advancements |
20 |
Vidhi Patel, Dr. Jayesh Patel and Dipika Patel |
Study on Meningitis through Mathematical Model |
21 |
P Jeyalakshmi and K Karuppasamy |
Nordhaus-Gaddum type results for domination number of a signed graph |
23 |
Shakrajit Sahu and Christopher Clement J |
Model Selection for Gaussian Process Using Regression Algorithms |
24 |
Shivran Priyanka Sureshkumar and Monika Saxena |
Garbage Classifier for Effective Waste Management Using Deep Learning : An Overview |
25 |
Ahamed Nishath S and Murugeswari R |
A Review on On-line Fake News Detection Based on Advanced Deep Learning Models |
26 |
S. Maragathasundari, C. Swedheetha and K. Karthikeyan |
Queuing study in smart car technology |
28 |
Dr Bhagya P, Sangamkumar H and Dr Lalitha Y S |
An Efficient Multibiometric Crypto-key generation |
30 |
Ashraf Alam |
Driving Effective Teaching-Learning Practices: Exploring the TF-IDF Model and Python for Educators |
31 |
Ashraf Alam |
Empowering Educators by Transforming Classroom Teaching-Learning with TF-IDF Model and Python: A Practical Guide for Teachers |
32 |
Ashraf Alam |
Empowering Educators through Data Analysis: A Practical Guide for Transforming Classroom Teaching-Learning with TF-IDF Model |
34 |
C Gayathri, S Saravanakumar, Yegnanarayanan Venkataraman and K Karuppasamy |
On Some Packing Set Variations of Graphs |
37 |
Priyanka G, Nivaashini M and Sivaranjani S |
Efficient Deep Learning based approaches for Early diagnosis of Diabetes Mellitus |
39 |
Eka Ogbaji, E.S. Onah and T Aboiyar |
Stochastic matrix for stock markets model |
40 |
Sivanandha Saraswathy and Lakshmi T |
Fuzzy Boundary Graphs and its Dynamics |
41 |
Jackson J and Perumal R |
A public key exchange protocol using tropical determinant |
42 |
Ponmaheshkumar A and Perumal R |
A lightweight key exchange protocol based on max-product semiring |
43 |
Ramagiri Praveen Kumar, Kalyan Chatterjee and M Raju |
VORONOING LOCATION SPECIFIC DATA |
44 |
Shalini K and Sridevi Polasi |
Different crop plans using Goal Programming and R programming |
45 |
Nathan Chane De la Cruz, Rocky Bigcas and Jerico Bacani |
The search for solutions of the Diophantine equation a^x + b^y + c^z = w^2 with Pythagorean triple bases |
46 |
Shahin Shaikh and Rupal Shroff |
ON THE LINE ZERO DIVISOR GRAPH OF SMALL FINITE COMMUTATIVE RINGS. |
51 |
Nagarajan M, Karthik K and Chandrasekaran P |
Existence Solution for Sobolev Type Fuzzy Neutral Integrodifferential Evolution Equation in n – Dimensional Fuzzy Vector Space |
52 |
Neha Kaliya, Dr. Digambar Pawar and Adesh Raut |
A Novel Lightweight Authentication and Privacy Preservation Model (NoLAPP) for Fog Based Smart Grids |
53 |
Srividya M, Vidhya D and Saranya V |
ON SOME PROPERTIES OF FUZZY ROUGH ALGEBRAIC TM PRODUCT SYSTEM |
55 |
Rajasekaran G and Uma L |
On local Antimagic Coloring of Some Graph Classes |
56 |
Pradip Kumar Parida and Naveen Chandra Bhagat |
Convergence of Newton-Steffensen method under Lipschitz continuous second derivative |
59 |
Ambika M, Selvarathi M and Dhanya V |
An Overview of Ϯξ – ₳ℱ – Subgroup over a Boolean Lattıce |
60 |
D Vidhya, V Saranya and M Srividya |
A Continuous Functions on Fuzzy Automata Lindelöf Structure Spaces |
62 |
Yogalakshmi Y, Mary U and Sreeja S |
A STUDY ON EXTENDED DISTANCE ENERGY OF SOME GRAPHS |
64 |
Priyalatha S.P.R, Vanitha S and Witczak T |
New Form of Continuity in Nano Soft s (I) Space |
65 |
Reny Jose and Ponmozhi K |
Spices classification using Computer vision and Deep learning algorithms with special reference to YOLO v8 |
67 |
S Karpagam, B Somasudaram, R Lokesh and Kavin Sagana Mary A |
An M^X/G/1 queueing system with Optional Service, Immediate Feedback and Bernoulli Vacation |
69 |
D Brightlin and G Dominic Babu |
Fibonacci Heat Equation Generated by Two and Three Dimensional Difference Equation |
71 |
Dhanya V, Selvarathi M and Ambika M |
A Systematic Approach to the Homomorphism on the Jp Neutrosophic Δϝ Subgroup |
72 |
Abirami K, Mohanapriya N and Dafik D |
On Edge-Equitable Antimagic connection number of Ladder graph families |
73 |
A. Anthony Raj, S. Prathap and D. Madhavakumar |
An Application of Pythagoras theorem from Heron’s formula to derive the foci of an Ellipse |
74 |
Ashokkumar Kulandasamy and Dharshan Dharshan |
OPTIMIZED FRAMEWORK FOR HIGH-SPEED OBJECT DETECTION IN BADMINTON USING DEEP LEARNING |
75 |
Chithrakumar Thangaraj, Dr.Thangamani M and M.Deepak M |
Leveraging Internet of Things and Artificial Intelligence for Climate Monitoring and Reporting |
76 |
Chithrakumar Thangaraj, Arvindh C C, Ashwanth K A K A and Akshai P P |
AUTOMATIC NUMBER PLATE DETECTION SYSTEM |
77 |
Krishnamugundh P, Karmel Arockiasamy, Kanimozhi G and Karthika P |
Analysis on Fertility of Soil Parameters using Machine Learning Algorithms |
78 |
Aishworyann, Shrey Kansal, Vibhor Mishra and Dr. Krishnendu Rarhi |
IMAGE ENCRYPTION USING 4D CHAOTIC MAP, RANDOM PIXEL PERMUTATION, IMAGE AS A KEY AND DNA ENCODING ON MULTILAYERS OF CHAOTIC SEQUENCE |
80 |
Jaya Sudha, Senthil Kumaran R, Balakumaran M and Athiyaman M |
Smart Portable Ventilator for Covid19 Patients |
81 |
Merlin C D, Divya M, Divyajothi M and Durga Dharshini M |
Sensing an Activated Mobile Phone by using Transmitted Signals |
82 |
Merlin C D, A Darwin, M. Gowtham and R. Danushkodi |
Design of an Home Automation System with Voice Controlled Application using Arduino |
83 |
Dr. Premkumar M, Prasanna A and Juliet Jeyapackiam J |
On fundamental Computational Properties μ-Anti-Fuzzy Subgroups |
84 |
Mahalakshmi Ayyavoo and Velmathi Guruviah |
Review on Medical Image Segmentation and Encryption using GAN |
86 |
M Jayalakshmi, B Vighnesh and S Durga Sai Sriram |
A Machine Learning Approach to Driver Drowsiness Detection Using Eye Aspect Ratio |
88 |
Veeralagan J and Manju Priya S |
Identification of Alzheimer’s Disease using K-Means for Pet Scan Datasets |
89 |
Anitha Ponraj |
Real time 2D object detection in vehicles using YOLO |
90 |
Suruthi K, Yuvaraj K, Navinkumar S, Arul Karthikeyan O and Kathiravan E |
Real-time Vehicle load Prediction and Indication system |
91 |
Ms. Aruna Arumugam G and Dr. Mohamed Divan Masood M |
Detecting the causes of cancer by DNA sequence mutation (Mutant p53) using deep learning computational model |
92 |
Soham Mitra, Navya Verma, Logeshwari V and Pattabiraman V |
Dental Cavity Classification using Convolutional Neural Network |
93 |
Amutha S, Vamsi Pydipati, Kandi Manikanta Reddy, Chekka Mahesh, Pilli Vamsi Krishna Reddy and Konda Ashok Reddy |
Driver Drowsiness Detection System using OpenCV and Keras |
94 |
Vijayalakshmi P, Karuppasamy K and Win Mathew John |
Towards Restrained Pitchfork Domination: An Efficient Congestion Control Mechanism In Ad-hoc Networks |
95 |
Chitra Ganesan |
ODD-FIBONACCI PRIME EDGE ANTI-MAGIC LABELING OF SOME SPECIAL GRAPHS |
96 |
Sangeetha H, Varshini V and Vibhushitha L |
Career Prediction System |
97 |
Aanandaram Velavan and Deepalakshmi P |
BLOCKCHAIN-BASED DIGITAL IDENTITY FOR SECURE AUTHENTICATION OF IOT DEVICES IN 5G NETWORKS |
98 |
A Ahila |
QUAKE OF EDGE SUNDER ON BLAST DOMINATION NUMBER |
99 |
Karthick P, Muthukani Vairavel T, Thangapandi K and Sundaresan P |
Analysis on Spherical Fuzzy Graphs with Dombi Operator |
101 |
Shuhan Zhang, Zhihang Xiao, Qiao Bi, Minjie Hu and Tao He |
What’s your next guess? Solution Word classification prediction model based on multi-dimensional feature Vector and MIMO-LSTM |
102 |
Vimala Devi Pandian and Yegnanarayanan Venkataraman |
On Some Interesting Connection Between Graph Coloring and Associated Topological Structures |
103 |
Kotte Sai Vamsi, Kothakota Mohamad Feroz, Kotha Ruthwik Saran, Kristipati Ravindra Reddy, Dandhuluri Varshith Varma and Dr Jayalakshmi Murugan |
Logo Detection By Using The Deep Learning Model |
105 |
Haripriya K, Harshini V, Jolinemelina A, Dr.Shahulhammed S, Preethi C and Dr. Pavalarajan S |
Drunkand DriveDetection systemfor Two-wheelers usingIOT |
106 |
Saravana Priya S, Suneela J and Prathyush Agarwal |
Python-based engine power estimate for bulk carrier using ship’s displacement |
108 |
Sundaresan P, Joseph Kennedy A, Karthick P and Muthukani Vairavel T |
Generators of Class Partition Algebra and G-edge colored partition as a Centralizer algebra of wreath product of an alternating group and G |
109 |
Heber Hernández, Elisabete Alberdi Celaya and Aitor Goti |
A comparative analysis of kriging and neural networks for mineral resource estimation |
110 |
S Ravikumar and B. Reddappa |
The consequence of slip boundary conditions, Hall current and Soret-Dufour forces on the dynamics of a Jeffery fluid in a tapered conduit with vertical asymmetry |
111 |
R. Sathish Srinivasan, R. Ezhilarasi, T.V. Sudharsan and G. Murugusundaramoorthy |
ON A NEW CLASS V ̃_q^* (k,γ,R,S) OF SYMMETRIC q- HARMONIC UNIVALENT FUNCTIONS RELATED TO SYMMETRIC CONVOLUTED OPERATOR |
113 |
Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P and Aushika D |
Computational and microbial analysis of metagenome of commerically available cookies revealed the presence of numerous bacteria |
114 |
Radhika Vs and Radhika Vs |
CONNECTED VERTEX-EDGE DOMINATING SETS AND CONNECTED VERTEX-EDGE DOMINATION POLYNOMIALS OF LOLLIPOP GRAPH L_(n,1) |
115 |
Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P, Aushika D and Rajnish K.N. |
Computational analysis of the putative beta-galactosidases of Cellulomonas gilvus ATCC 13127 |
116 |
Sreenivasulu Reddy L, Devendra Jangiti and Kotte Amaranadha Reddy |
Counting of Various Type of Cycles in Topology based Graphs |
117 |
Maheswari M and Brintha N.C |
Detection of Various Casting Defects in Manufacturing Sectors using Deep Learning |
118 |
Kameswari M and Muthumari U |
On f-Topological Spaces |
119 |
Muthukani Vairavel T, Joseline Manora J, Karthick P and Sundaresan P |
MAJORITY AND CONNECTED MAJORITY DOMINATION ON EDGE ADDITION GRAPHS |
120 |
V Renuka Devi and Greeshma Mahesh |
Extension of ideals |
123 |
Sapna S and Biju R Mohan |
A Neural Network Model for Implied Volatility Estimation of Options: A Use Case for Indian Option Market |
124 |
Pavithra R, Indira Priyadharshini M and Dhivyashree M |
A COMPREHENSIVE SURVEY ON SMART AGRICULTURE USING IOT |
125 |
Dhivyashree M, Vishnu Durai Rs and Pavithra R |
AN AI-DRIVEN MODEL FOR DECISION SUPPORT SYSTEMS |
126 |
S Pooja, M Vigneshwaran and L Vidyarani |
On α*g#φ-closed sets in Topological Spaces |
128 |
Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P, Aushika D and Rajnish K.N. |
Computational analysis of the putative endoglucanases in the genome of Cellulomonas flavigena ATCC 53703 |
129 |
Tharakeswari V, Kameswari M and Kavitha S |
WARI’S Algorithm for Ranking Triangular Fuzzy Numbers |
130 |
Revathy G |
LAND RATE PREDICTION USING COMPUTATIONAL INTELLIGENCE |
131 |
Revathy G |
COMPUTATIONAL INTELLIGENCE FOR LEAF DISEASES MONITORING USING UAV IMAGES |
132 |
Revathy G |
Bee Topology Of Wireless Ad Hoc Networks BTWANET |
133 |
Archana D |
WIRELESS SENSOR NETWORK-LOCATION METHODOLOGY AND ITS REAL TIME APPLICATION |
134 |
Dr.M Sangeetha and T Mummoorthy |
Fractional Programming for Undetermining Multi-Objective Transportation Problem with Goals using Fermatean Fuzzy Number |
135 |
Maheswari B and Chitra V |
Tangent Similarity Measure and Weighted tangent similarity measure of Infra Fuzzy Sets and its Application |
136 |
Debapriya Biswas and Ipsita Rajwar |
Projective disk and Poincar\'{e} disk: Exploring $\text{SL}(3,\mathbb{R})$ action from an Erlangen perspective |
137 |
G.Somasundara Ori and Abirami B |
MODELLING OF NEUTROSOPHIC THEORY BULK QUEUEING SYSTEM |
138 |
Elakiya E, Tejus Paturu, Chaithanya Naik Keluth and Sai Tarun V |
Investigating Feature Extraction and Classification Algorithms for Effective Lung Disease Detection using Chest X-ray images |
139 |
Arkady Wey, Chris Breward, Jon Chapman and Ian Griffiths |
Multiscale models for particle-laden flow through periodic networks |
140 |
Sai Hanwith Bellamkonda, Aditya Vardhan Kadambari, Sai Kiran Rachakonda, Vamsi Krishna Panchadi and Gireesh Kumar Tanavarapu |
Grammar Error Correction using Monotonic Attention |
142 |
Parivazhagan A and Jairus Ponrabi |
Smart Stick – A Device for Obstacle Detection and Location-Based Assistance for the Blind |
143 |
Giri Hallur, Ashok P and Aslekar Avinash |
Virtual Threads of Connectivity: Telecom Software Insights |
145 |
Saravanan S and Gunasekaran S |
FIXED POINT OF BIANCHINI TYPE CONTRACTION ON S-METRIC SPACE WITH AN EIGEN VALUE PROBLEM |
146 |
Maheshprabha M and Kameswari M |
APPLICATIONS OF POSSIBILITY PYTHAGOREAN FUZZY SOFT EXPERT SET IN MEDICAL DIAGNOSIS |
147 |
Rahim K H and M Thiagarajan |
M/ M(a,b) /2 CONTROLLED ARRIVAL RATES AND INTERDEPENDENT QUEUEING MODEL |
148 |
Amala Richard and A Rajkumar |
MCDM using Modified TOPSIS Method based on the Bipolar Neutrosophic Set: Application in Selection of Cloud Service Provider based on QoS |
149 |
S. Nivetha Therasal |
POISSON INPUT AND EXPONENTIAL SERVICE TIME INTERDEPENDENT QUEUEING MODEL WITH BREAKDOWN AND CONTROLLABLE ARRIVAL RATES |
150 |
P Gurusamy and R Angel Joy |
Strong Weak Stress Domination in a Graph |
152 |
Praphull Chhabra and Sonam Chhabra |
APPLICATION OF NEW FUZZY MEASURE IN MULTI-ATTRIBUTE DECISION-MAKING |
154 |
Pranav Kb, Adithya Venkatraman, Subhashini N and Muthulakshmi S |
Image steganalysis using discrete cosine transform |
155 |
T Vijay, Dr.S. Bala and Dr.K. Thirusangu |
EIGEN VALUES IN THE FRAMEWORK OF SOME DIGRAPH |
156 |
V Suganya, Dr.S. Bala and Dr.K. Thirusangu |
CORDIAL LABELING IN THE CONTEXT OF A SPECIAL GRAPH |
158 |
M Nandhini, S Bala and K Thirusangu |
PELL INDEX FOR SOME GRAPHS |
159 |
Anjana Thampy S and Dr. Jeyaraj Jane Rubel Angelina |
Sentiment Analysis and Emotion Recognition from Speech using Paralinguistic and Spectral Feature Extraction using Deep Learning Techniques |
160 |
Esakki Muthu S and Kartheeban K |
A Blockchain Technology–Trust as A Service |
161 |
Ayan Pathak, Raina Paul and Sayani Mondal |
Classification of News Paper Headlines |
162 |
Aheli Acharya, Raina Paul and Sayani Mondal |
A Study on Education System in India Pre- and Post-Digitisation |
163 |
Shimja Majida |
COVID-19 DETECTION USING DEEP LEARNING METHODS |
166 |
Moses Dian, Dhayalan D and Vimalsubramanian G |
Optimized On Demand Services with Incentive Mechanism in P2P Network |
168 |
Shyamala K and Mercy Evangeline M |
Extractive Text Summarization Usıng Frequency Based Feature Extraction For Single Document In Tamil Language |
169 |
Ramesh Ramasamy, Ramesh Ramasamy and Ramesh Ramasamy |
DECOMPOSITION OF $(\vartheta,\delta)$- CONTINUITY |
170 |
Sujatha P, Peddsasanjanna Manasa and Nithya P |
CLIMATE SMART AGRICULTURE USING MACHINE LEARNING |
171 |
Sundaranarayana D, Kamaleshwar T and Peter Soosai Anandaraj A |
A LEARNING BASED ROUTING SCHEME AIDED WITH STABILIZED CLUSTERING FOR LOAD BALANCING IN MOBILE ADHOC NETWORK TO IMPROVE ENERGY EFFICIENCY |
172 |
Parthasarathy R, Peter Soosai Anandaraj A and Kiruthiga Devi M |
RECUPERATING OF AD-HOC ROUTING NODES IN THE CLUSTER SCENARIO (RARICS) TO ENHANCE THE NODE CHAIN CONNECTION AND THE SECURITY IN THE AD HOC NETWORK |
173 |
Asif S and Kartheeban K |
Motion Picture Streaming Based On Vehicle Detection Using Yolov4 Algorithm |
174 |
Peter Soosai Anandaraj A, Ramesh P and Amali Angel Punitha A |
TRAFFIC SIGN RECOGNITION USING CONVOLUTIONAL NEURAL NETWORK MODEL |
175 |
Kiruthiga Devi M, Parthasarathy R and Peter Soosai Anandaraj A |
SAFETY WEARABLE DEVICES FOR CIVIL WORKERS |
177 |
Diana A and Kartheeban K |
Cyber resilience against advanced persistent threat using multi agent AI in I-IoT |
178 |
Abinaya K, Dhanasekaran S and Vasudevan V |
A Survey on Manipulating Virtualized Service Management in Mobile Edge Cloud Network |
179 |
Vinodhini H and Dr.D.Amudhaguka |
Stock Price Prediction Using Machine Learning Techniques with Sentiment Analysis – A Review |
180 |
Shimja M |
ENHANCED COVID-19 DETECTION USING CNN AND DARKNET: ADVANCING CT SCAN AND CHEST X-RAY ANALYSIS |
181 |
Vanthana V and Kartheeban K |
A STUDY ON THE IMPACT OF SENTIMENT ANALYSIS ON THE RELIABILITY RECOMMENDATION SYSTEMS |
183 |
T. Jones Daniel and Dr.R.Sundar Rajan |
Ml Based Bedridden Patient Risk Level Prediction Using Km-C,Dt-Id3 And Xg Boost Analysis |
184 |
Rushikesh Shaharao, Gopal Sakarkar, Abhijeet Khandagale, Mahima Gaurihar, Ramsha Shaikh and Rupak Kadhare |
Semantic Similarity in Multi-Source Information Retrieval for Improving Learner Performance |
186 |
Thamizhendhi G, Kanakambika K and Kameswari M |
SOME OPERATIONS ON CONGRUENCE LABELED GRAPHS |
187 |
Priyadharshini S, Bharath Singh J, Selvalakshmi S, Sathya Narayanan Velmurugan, Vivekrabinson K and Shanmuga Raja B |
Enhancing Indoor Air Quality through an Automatic HVAC Duct Cleaning Bot |
188 |
Vijay M, Nandhini N, Vivekrabinson Rabinson, Shanmugaraja B and Sundareswaran N |
Image denoising based on nature-inspired optimized deep neural network |
189 |
Vijay M, Nandhini N, Vivekrabinson K, Shanmuga Raja B and Sundareswaran N |
System for detection and classification of anomalous behavior and fixing anomaly with firewall configuration |
190 |
Rufai Iliyasu |
COMPARATIVE STUDY OF OUTLIER DETECTION PROCEDURE IN MULTIPLE LINEAR REGRESSION MODEL |
191 |
Vivekrabinson K, Rajesh Kumar S, Vijayakumar D and Bharath Singh J |
Blockchain Enabled Real Estate Property Transactions using NFT: An Approach |
192 |
George J |
On coloring certain prime distance graphs |
193 |
Jannatul Ferdous Medha, Asraf Ahmed, Utsu Chowhan and Md Abrar Hamim |
Defect Fabric Detection using Deep Learning Approach |
194 |
Md Abrar Hamim, F.M. Tanmoy, Umme Fatema Tuj Asha, Md Nazmul Haq, Maruf Alam and Bijoy Ghosh |
Lung Cancer Detection using Machine Learning Approach |
195 |
Mahalakshmi P and Thenmalar S |
Feature Based Training for Crime Detection using Deep Learning Techniques |
196 |
Akshaya Rajendra Gupta, Sathya Narayanan Velmurugan, Bharath Singh Jeberaj, Gokul Senthil Kumar and Dushyanth Shanmugam |
HANDWRITTEN TEXT RECOGNITION USING DEEP LEARNING |
197 |
Jithin Jacob |
Mental Health Assessment over Voice Analysis by Using Machine Learning Techniques |
198 |
Abhijit Bhattacharya, Kamlesh Dubey and Bikromadittya Mondal |
Volumed of a n dimensional hyperbolic simplex |
199 |
E Poongothai and E Padmavathi |
ON FUZZY NEUTROSOPHIC TOPOLOGICAL SPACES C-ALMOST P-SPACES AND OTHER SPACES |
201 |
Shyam Shanckin, Gayathri Mahendran and Gokhulnath Thirumaran |
Gaussian Processes for Automating Model Selection |
202 |
Gayathri Mahendran, Gokhulnath Thirumaran, Syed Imam Ali and Vishwas Raj Jadon |
NAS for Automated ML Deployment on Extreme Edge Devices |
203 |
Harsh Zele |
Performance Evaluation and Comparative Analysis of Machine Learning Techniques for Classification and Regression: A Study on the Vinho Verde Dataset |
204 |
R Revathi |
Identifying Influential Users on Twitter: Leveraging Big Data Analytics and Machine Learning |
205 |
R Revathi |
A Journey through Multifaceted Data in Machine Learning Predictions on Financial Viability |
206 |
Harsh Zele |
Fruit and Vegetable Segmentation with Decision Trees |
207 |
Ganesh Meshram |
Effect of Solid-fluid Interaction Parameters on Fluid Flow through Microchannels Using Lattice Boltzmann Method |
208 |
Selvamanju E and Akilandeswari Senthil Kumar |
Oppositional Squirrel Search Optimization (OSSO) Algorithm in 5G Cellular Networks |
210 |
Adithya K, Sumathi R, Nanda Kishor Reddy K and Harsha Vardhan G |
AUTOMATED FOOD IMAGE CLASSIFICATION USING DEEP LEARNING |
211 |
Ahmad Abubakar Umar and Hamisu Musa |
Convergence and Order of the Extended 2-point Super Class Block Backward Differentiation Formula with Off-step Points for Solving Stiff IVPs |
213 |
Kannan Kanagaraj |
Unsharp Masking of Medical Images Using Rolling Guidance Filter |
214 |
Muthumeena M and Balamurali S |
Optimal Designing of Chain Sampling Plan for Assuring Median Life Under New Compounded Bell Weibull Life Time Model |
215 |
Binta Abubakar, Dahiru Umar, Umar Mohammed and Willaims Dunama |
Polynomial Collocation Method for the Solution of Integro-Differential Difference Equations |
216 |
Lany Dullas |
A Structural Model of Mathematics Performance as Influenced by Students’ Engagement with Technology to Students’ Motivation |
217 |
Nagaraj P, Kirthiga N, Sureshkumar S and Prathipa K |
Retinal Disease Classification for Color Fundus Images Using a Novel Deep Convolution Neural Network |
221 |
Nagaraj P and Sureshbabu P |
A Framework to Create Recommendation Systems for Data Science Applications |
222 |
Najeem Dheen Abdul Majeeth, Vinoth Kumar E S, Hemavathy P and Loyola Jasmine J |
BONE FRACTURE DETECTION USING CONVOLUTIONAL NEURAL NETWORK |
224 |
Raja M and Nagaraj P |
BLIND PEOPLE OBJECT RECOGNITION USING ESP32 CAM MODULE |
225 |
Archa A T |
Privacy-Enhanced Distributed Machine Learning against Poisoning Attacks |
226 |
Abirami K |
Implementing nutrition regulator for stabilizing anxiety among special kids using optimized RNN techniques in evolutionary Deep Learning concepts |
227 |
Monisha Privthy Jeba J |
Predicting Gene Signatures for Alzheimer’s Disease: A Transformer Model Approach |
228 |
Dr.Swapna B, D Surendiran Muthukumar, Y Sunil Kumar Reddy, U Vijayabharathi, Y Saieswar Reddy and M Saravana Kumar |
DESIGN AND DEVELOPMENT OF WRITING ROBOT USING SPEECH PROCESSING |
229 |
Pothula Sujatha, Muhammed Shijas K and Nithya P |
ENGLISH TO MALAYALAM TRANSLITERATION USING RULE-BASED APPROACH AND NAMED ENTITY RECOGNITION USING MACHINE LEARNING |
230 |
Dr.B Swapna, D Surendiran Muthukumar, Y Sunil Kumar Reddy, U Vijayabharathi, Y Saieswar Reddy and M Saravana Kumar |
DESIGN AND DEVELOPMENT OF WRITING ROBOT USING SPEECH PROCESSING |
231 |
Ishvarya M and Brintha N.C |
PROGNOSTICATION OF LIGAMENT CANCER AND TEAR |
232 |
R. Sasikumar and M. Sujatha |
Statistical Process Control in Healthcare: A Systematic Review of Control Chart Applications |
233 |
Sdharson K, Anita C.S., Badi Alekhya, Swathi Essakki K, Jasmitha Reddy M and Lakshmi Akshitha Y |
EchoSight: Blending Deep Learning and Computer Vision for Unparalleled Navigational Support for the Visually Impaired |
234 |
Jeya Sundari M |
Ovarian tumor diagnosis models using machine learning and deep learning |
235 |
Mr Dhakshunhaamoorthiy, Dr. Jawahar A, Ms. Bharathi Shri C and Dr. Sudharson K |
Fuzzy-Based Data Drift Detector for Novel Concept Drift Detection in IoT Data Stream Mining |
236 |
Sudharson K, Rajalakshmi D, Badi Alekhya and Varsha S |
BlockGov: Blockchain-Based Data Governance in the Internet of Things using Smart Contracts |
237 |
Murugavalli K and Ramalakshmi R |
Evaluating and exploring the changes in EEG signal patterns following walking using machine learning algorithm |
238 |
Anajli N and Dr. Rajkumar Kannan |
A Novel Contrast Enhancement Algorithm for Detecting Defects From Fruits and Vegetables |
239 |
J.Nirmala Joseph and Dr.J.Srikiruthika Mam |
Fuzzy Soft r-precontinuity |
240 |
Sudharson K and Sasıkumar R |
IoTChain: Leveraging Blockchain for Enhanced Device Authentication in IoT Security |
241 |
Sathyamoorthi V, Chandrasekar T and Matheswaran M |
DOES QUALITY OF NURSES WORK LIFE MATTER FOR JOB SATISFACTION? EVIDENCE FROM TAMILNADU |
242 |
S J Subhashini, Jeyaraj Jane Rubel Angelina, Sai Kiran M J, Vinay N, Tejeswar Reddy S and Madhu Kiran M |
FINDING MISSING PERSON USING AI |
243 |
Sudharson K, Badi Alekhya and Mohan Raj K R |
HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange |
244 |
Indumathi C.P, Devasena K and Asha K |
LSTM-Based Deep Learning Model for Handwritten Word Recognition |
245 |
Malathi K, Himantha Rao Kolli, Hemavathy P and Najeem Dheen Abdul Majeeth |
An Extensive Research on Disease Prediction Algorithms and a comparative view in Machine Learning, Deep Learning,Artificial Intelligence |
246 |
Mahesh Prabha M and Kameswari M |
Application of Generalized Pythagorean Fuzzy Soft Expert Sets in Decision Making |
247 |
Balakiruthiga B, Deepalakshmi P, Rajesh Babu C and Angayarkanni S A |
A Survey on Artificial Intelligence-based Conflict Resolution Algorithms for Software Defined Data Center (SDDC) |
248 |
Esakki Muthu S and Kartheeban K |
A Comprehensive Survey of Blockchain Technology–Trust as A Service |
249 |
Richard Taclay, Karen Taclay and Sonny Solmerin |
Primitive Solutions of the Diophantine Equation px^2 + qy^2 = z^2 |
251 |
D Sudha and Dr. P Sujatha |
Predicting Complications of Pregnancy using AI & ML |
252 |
Indumathi C P, Diviyalakshmi K R and Mahalakshmi R |
BIRD SOUND IDENTIFICATION SYSTEM USING DEEP LEARNING |
253 |
Dr. Gautam Singh and Vijay Kumar |
Direct Discontinuous Galerkin Method for Two-Parameter Singularly Perturbed Parabolic Problems |
255 |
A.Kaveena Rebecca and Dr. N C Brintha |
A Novel Deep Learning-Based Prediction of DME in Eye Diseases |
256 |
Margaret Savitha |
Comparative study of the GPT and other Long Language Models (LLMs) |
257 |
Deeksha Singh and Rajesh K. Pandey |
A fourth order accurate numerical method for non-linear time fractional reaction diffusion equation on a bounded domain |
259 |
S Kavitha and V Renuka Devi |
Integral Boundary and Co-boundary maps of some Quotient spaces |
260 |
R. Raja Subramanian, Pallapu Karthik, Nagasai Venkat Pavan Kumar Ungarala, Chiranjeevi Pathipati, Abhiram Galla and R. Raja Sudharsan |
SignNet: Design and Evaluation of a Deep Neural Network Model for Recognition of English Alphabetic Signs for SHIP People |
261 |
Nagaraj P, Kirthiga N, Sureshkumar S and Wilson Prakash S |
Canny Edge Detection- Based Smart Traffic Control System Using Multitype Image Processing |
262 |
Dr Hemavathy P and Dr Vinoth Kumar E S |
An Accurate Crop Identification using AI based Convolutional Neural Network |
263 |
Benita J, Prasanth S and Vijaya Lalitha G |
Compute The BMI Level Of A Human Without Any Instruments Using Artificial Intelligence |
264 |
Diptadip Maiti, Madhuchhanda Basak and Debashis Das |
Inter-generational Fingerprint Correlation Analysis: Unveiling Inherited Patterns and Identification Reliability |
265 |
Narla Venkata Anand Sai Kumar, Saila Lakshmi Sai Malleswara Rao and Noora Harish |
Phishing Website Detection based on Improvised Mutual Information Feature Selection with Swarm intelligence Convolutional Neural Network |
266 |
Sachchidananda Jana, Pabitra Pal and Asim Kumar Mahadani |
A Hybrid Watermarking Scheme using DWT and Haar Transform for Image Authentication |
269 |
James Daniel |
Colorectal Cancer using Image Classification |
270 |
Usha Bhakthavatsalam and Dr. Amuthaguka D |
Light Weight Attribute-Based Encryption for Resource-Constrained Devices: Challenges, Solutions and Future Directions |
271 |
Jemimah K and Dr.Rajkumar Kannan |
Medical Text Intent Recognition using Multiclass Classifier-BERT and XLNET |
272 |
Jemima Gracia and Rajkumar Kannan |
Early Detection of Fake News using Deep Learning LSTM Networks |
273 |
Shyam Shanckin, Mayank, Rahul Patwadi and Anshuman Singh |
Unveiling Latent Spaces with Variational Autoencoders |
274 |
Thangapandi Kalidas, Narayanamoorthy S, Kang Daekook, Karthick P and Sundaresan P |
A Fuzzy Approach Numerical Simulation for Computer Virus System of Fractional Order |
275 |
Vasu Ve and Kalyanaraman R |
A Finite Capacity Single Server Queueing System with Additional Optional Service |
277 |
Subhashini A |
DEGREE-BASED TOPOLOGICAL INDICES FOR GRAPH STRUCTURES AND GRAPHENE |
278 |
Srinivasan S, Sampath Kumar K, Ganesh D, Nagaraj S and Jeya A Celin J |
Effective Cost Reduction Usage of Infrastructure in Small Scale Sectors using Cloud Storage and Internet of Things |
279 |
Ayyappan G and Arulmozhi N |
Analysis and empirical investigation of queueing inventory system: Two classes of customer under non-preemptive priority, single vacation, and (s, S) replenishment policy |
280 |
Ayyappan G and Meena S |
Phase type Inventory Queueing Model with Two commodity, Vacation and Breakdown and Repair |
281 |
Kalyanaraman R and Vidya K |
M/G/1 Queue with Regular and Optional phase of services and with R+1 phases of vacation |
282 |
Ayyappan G and Archana Gurulakshm G |
Analysis of MAP/PH/1 retrial queue with Optional service, Vacation, Unreliable server, Standby server and Discouragement |